Cited By
View all- Zieris PHorsch JKim JAhn GKim SKim YLopez JKim T(2018)A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow IntegrityProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196531(369-380)Online publication date: 29-May-2018
- Dang TManiatis PWagner DBao FMiller SZhou JAhn G(2015)The Performance Cost of Shadow Stacks and Stack CanariesProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714635(555-566)Online publication date: 14-Apr-2015
- Chen CChen STing WKao CSun H(2015)An enhancement of return address stack for securityComputer Standards & Interfaces10.1016/j.csi.2014.08.00838:C(17-24)Online publication date: 1-Feb-2015
- Show More Cited By